Answer:
customers = int(input("How many customers? "))
for i in range(customers):
name = input("Name of Customer " + str(i+1) + " ")
print("Oranges are $1.40 each.")
oranges = int(input("How many Oranges? "))
print("Apples are $.75 each.")
apples = int(input("How many Apples? "))
bill = oranges * 1.4 + apples * 0.75
print(name + ", you bought " + str(oranges) + " Orange(s) and " + str(apples) + " Apple(s). Your bill is $%.1f" % bill)
Explanation:
*The code is in Python.
Ask the user to enter the number of customers
Create a for loop that iterates for each customer. Inside the loop, ask the user to enter the name, number of oranges, number of apples. Calculate the bill. Print the name, number of oranges, number of apples bought and total bill
Answer:
In the ISO/IEC 27002 framework, Cryptography describes the use and controls related to encryption, to help an organization implement, maintain, and improve its information security management.
Answer:
Quantitative data
Explanation:
Quantitative data is information about quantities; that is, information that can be measured and written down with numbers. Some other aspects to consider about quantitative data: Focuses on numbers. Can be displayed through graphs, charts, tables, and maps.
Answer:
Internal and External Zones
Explanation:
Demilitarized Zone (DMZ) in a network means that, we make sure the security of network at higher level as military make sure the security of their bases or zones.
In this type of network, The network of the internal organization (LAN) needs security from hackers and unauthorized users who are trying to access the resources and information from the network.
This network is divided into two major zones. A DMZ has been placed between two zones along with firewalls enhance the security of LAN Network from the networks on internet. These two zones are named as Internal and External Zone. The firewall between DMZ and External zones monitors the users from external networks on the internet who tries to access organization's network. Internal network monitors the traffic between DMZ and Internal LAN network.
Answer:
False
Explanation:
A web-based application encounters connectivity and compatibility relate to data server. It does not belong to any hardware environments.
A web based application is accessed over network.They run inside a web browser. Small of program is download to user's desktop, but this processing is done over internet.